It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Eighteen-page presidential memo reveals how Barack Obama has ordered intelligence officials to draw up a list of potential overseas targets for US cyber attacks
PRESIDENTIAL POLICY
MEMORANDUM FOR THE VICE PRESIDENT
THE SECRETARY OF STATE
THE SECRETARY OF THE TREASURY
THE SECRETARY OF DEFENSE
THE ATTORNEY GENERAL
THE SECRETARY OF COMMERCE
THE SECRETARY OF ENERGY
THE SECRETARY OF HOMELAND SECURITY
ASSISTANT TO THE PRESIDENT AND CHIEF OF STAFF
DIRECTOR OF THE OFFICE OF MANAGEMENT AND BUDGET
ASSISTANT TO THE PRESIDENT FOR NATIONAL SECURITY
AFFAIRS
DIRECTOR OF NATIONAL INTELLIGENCE
ASSISTANT TO THE PRESIDENT FOR HOMELAND SECURITY
AND COUNTERTERRORISM
DIRECTOR OF THE OFFICE OF SCIENCE AND TECHNOLOGY
POLICY
DIRECTOR OF THE FEDERAL BUREAU OF INVESTIGATION
DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY
CHAIRMAN OF THE JOINT CHIEFS OF STAFF
DIRECTOR OF THE NATIONAL SECURITY AGENCY
II. Purpose and Scope (U)
The United States has an abiding interest in developing and
maintaining use of cyberspace as an integral part of U.S.
national capabilities to collect intelligence and to deter,
deny, or defeat any adversary that seeks to harm U.S. national
interests in peace, crisis, or war. Given the evolution in U.S.
experience, policy, capabilities, and understanding of the cyber
threat, and in information and communications technology, this
directive establishes updated principles and processes as part
of an overarching national cyber policy framework.
The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
The United States Government shall conduct DCEO and OCEO under
this directive consistent with its obligations under
international law, including with regard to matters of
sovereignty and neutrality, and, as applicable, the law of
armed conflict.
This directive pertains to cyber operations, including those
that support or enable kinetic, information, or other types of
operations. Most of this directive is directed exclusively to
DCEO and OCEO.
The United States Government has mature capabilities and
effective processes for cyber collection.
Therefore, this directive affirms and does not intend to alter
existing procedures, guidelines, or authorities for cyber
collection.
This directive provides a procedure for cyber collection
operations that are reasonably likely to result in
"significant consequences."2
just as the NSA and IRS have not done nothing wrong, and have done what they did by the law as it written. Obama law, and Bush Laws that is...more kool aid anyone? Pardon me that's King Obama.
The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
Originally posted by bekod
well if past actions should tell you anything , then this means nothing, from your postjust as the NSA and IRS have not done nothing wrong, and have done what they did by the law as it written. Obama law, and Bush Laws that is...more kool aid anyone? Pardon me that's King Obama.
The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
as I read it, by just saying "POUTS is a sell out" could have repercussions.
inhibiting detection or attribution, even if they create cyber
effects.
Defensive Cyber Effects Operations (DCEO): Operations and
related programs or activities other than network defense or
cyber collection - conducted by or on behalf of the
United States Government, in or through cyberspace, that are
intended to enable or produce cyber effects outside
United States Government networks for the purpose of defending
or protecting against imminent threats or ongoing attacks or
malicious cyber activity against U.S. national interests from
inside or outside cyberspace.
Nonintrusive Defensive Countermeasures (NDCM): The subset of
DCEO that does not require accessing computers, information or
communications systems, or networks without authorization from
the owners or operators of the targeted computers, information
or communications systems, or networks or exceeding authorized
access and only creates the minimum cyber effects needed to
mitigate the threat activity.
Offensive Cyber Effects Operations (OCEO): Operations and
related programs or activities other than network defense,
cyber collection, or DCEO -- conducted by or on behalf of the
United States Government, in or through cyberspace, that are
intended to enable or produce cyber effects outside
United States Government networks.
Cyber Operations: Cyber collection, DCEO (including NDCM),
and OCEO collectively. (U)
Significant Consequences: Loss of life, significant
responsive actions against the United States, significant
damage to property, serious adverse U.S. foreign policy
consequences, or serious economic impact on the United States.
(U)
U.S. National Interests: Matters of vital interest to the
United States to include national security, public safety,
national economic security, the safe and reliable functioning
of "critical infrastructure," and the availability of "key
resources."1 (U)
Emergency Cyber Action: A cyber operation undertaken at the
direction of the head of a department or agency with
appropriate authorities who has determined that such action is
necessary, pursuant to the requirements of this directive, to
mitigate an imminent threat or ongoing attack against U.S.
national interests from inside or outside cyberspace and under
circumstances that at the time do not permit obtaining prior
1 As these terms are used in on "Critical Infrastructure,
Identification, Prioritization, and Protection" from December 17, 2003. (U)
Originally posted by bekod
reply to post by elouina
Here is Bush EO 12333 into law in 2008 www.techlawjournal.com... giving NSA CIA to read listen in and open any post that any one should make if on a "hit list" deemed by NSA. so how do you get on the list NSA has to listen, read, and see what your doing 24/7